CyberArk Interview Questions and Answers
CyberArk Interview Questions and Answers
You should talk about your current infrastructure like how many Vaults are there and if Vaults are
standalone or in HA, then how many PVWAs, CPMs, PSMs, PSMPs, PTA etc.
We should talk about your infra only as the interviewer will be asking the questions on that behalf.
If I must answer this question as per my current environment, then it must have been like:
X no.of PVWA Servers…. kind of server (VM / Cloud) and it is Load balancer or not
X no.of PSM Servers …. kind of server (VM / Cloud) and it is Load balancer or not
X no.of CPM Servers …. kind of server (VM / Cloud) and it is Load balancer or not
X no.of PSMP Servers …. kind of server (VM / Cloud) and it is Load balancer or not
Answer this question as per your profile only because the interviewer may ask his next questions on
behalf of your roles & responsibilities.
Working as a Subject Matter Expert (SME) and supporting the project in Operations, Upgrades,
Implementation to ensure smooth operations.
Upgrading CyberArk components if a new version is released which include Vault, CPMs, PVWAs, PSMPs,
AAM, PTA & PSM in HA along with a standalone instance at DR site.
Discussing with various teams which includes windows, Unix, Networking, and security along with
various application team to understand the current privilege accounts being used and understand the
current way how these accounts can be managed.
Customizing CyberArk Connection components and making the necessary changes according to client’s
requirement.
You can answer these questions as per your profile and your Daily BAU activities. Don’t say anything
apart from it which you don’t know.
Master user can login ONLY through PrivateArk client using PrivateArk authentication in PRIMARY VAULT
SERVER.
When a user login to CyberArk and type the wrong password then after the 5 wrong attempts, user’s
accounts get suspended, and user can’t login to CyberArk until the account is activated. The default
value is 5 and it can be increased maximum by 99.
Login to PrivateArk client using Administrator or any account which have permission Like Administrator
to activate the user account.
Account can only be activated from PrivateArk client not from PVWA.
Q.5. What are the different ways of onboarding an account?
When you try to retrieve the password then there’s a time defined.
Lookout for Password Revealing and increase the time as per the requirements.
Apply Ok.
Increasing the password revealing time totally depends upon your company’s policy. As in Internet
explorer, user can directly copy the password using the copy option but in Google chrome they can’t
copy directly. They need to click on show and then double-click and then copy. When they click on show
then there’s password revealing time start and its default value is 10 seconds.
When a user clicks on Connect option then PVWAApp user go to Vault and fetches the password of
PSMConnect user.
PSM Shadow user connects to the target server with the protocol chosen by the user.
Recording of the session is stored temporarily on PSM and when user disconnects the session then
recording file is uploaded to CyberArk Vault.
And logs are forwarded to configured SIEM (Splunk, ArcSight, QRadar etc.).
To understand the workflow, one must know about the functions of PVWAGW, PVWAApp, PSMAPP &
PSMGW users.
These users are in-built and created when installing PVWA & PSM respectively.
PVWAApp User: This user is used by PVWA for internal processing. Its’ the only user in the vault who is
responsible for opening the PVWA URL. If this user gets suspended, PVWA URL can’t be accessed.
PVWAGW User: This user is generally used for provisioning the other users to the Vault. If this user gets
suspended, you won’t be able to login to PVWA.
PSMApp User: This user is generally used by PSM for internal processing. It's used to retrieve
configuration from the vault, create recording safes. In new versions, it has the audit and add safes
authorization in the vault.
PSMGW User: This user is a part of PVWAGWaccounts group, so it gets the access to all password
objects. And used by PSM to fetch the target account’s password.
From the above use of these users, you can see how these accounts are used to grant access to vault or
target machine.
Unix Platform: 22
Database : 1521
For changing the password of windows accounts, CPM uses windows API to connect to that machine
and then using the net user command to change the password, for changing the password of Unix
accounts, it uses plink to connect to Unix and change the password accordingly. (Different flavors of
Linux have different commands to change the password.)
CPM is assigned to a safe and in a single safe you may have many accounts.
There can be multiple passwords out of sync issues. Suppose if CPM is load balanced then any of the
CPM will change or verify the password according to the Master Policy and if it fails to change or verify
and in that case another CPM tries the same thing and it got successful but how the first CPM will
know... It will push change again so in that case there will be lot of out of sync issues.
Q.11. How to restrict a LDAP user to use only PSM and PVWA?
Navigate to Computer Configuration > Administrative Templates > Windows Components > Remote
Desktop Services > Remote Desktop Session Host > Security.
In the Options area, from the Encryption Level drop-down list, select High Level.
Open the Security setting, Require use of specific security layer for remote (RDP) connections.
In the Options area, from the Security Layer drop-down list select:
Connections to the PSM require a certificate on the PSM machine. By default, Windows generates a self-
signed certificate, but you can use a certificate that is supplied by your enterprise.
Q.13. How to increase the debug levels for CyberArk Vault & its Components?
- CPM: CPM.ini (or via PVWA System Configuration): Upto 6, platformwise, Auto Detection,
- DebugLevel=High (None/High/Low)
- InformationLevel=High (None/High/Low)
CyberArk.WebApplication.log
CyberArk.WebConsole.log
CyberArk.WebSession..log
PVWA.App.log
Q.14. How to allow firewall between Vault and a server and how many IPs we can add?
Vault service must be restarted after changing parameters in the DBParm.ini file
Eg: AllowNonStandardFWAddresses=[1.1.1.1,2.2.2.0-2.2.2.255,3.3.3.0-3.3.3.255,...],Yes,1000:inbound/
tcp
Get an SSL certificate containing all the info of your PVWA and if PVWAs are load balanced then it should
have LB info too.
Open IIS settings, edit the bindings and select the SSL cert to 443 and apply.
Yes, you can have different password complexity for every platform.
Same password complexity should be set on your target server too, otherwise CPM will fail to change
the password.
Install the Windows patch for the relevant Operating System. Restart the Vault server if requested to.
Verify the KB installed successfully on the server and stop all windows services enabled. You can consult
CyberArk support before patching the Vault as not every patch is applied to Vault servers.
Q.18. Maximum number of transactions that can be received & processed concurrently by the Vault?
The max. number of transactions can be received by Vault can be 9000. And transactions handled
concurrently are around 600 by the Vault.
2FA: When two authentication methods are being used to provision the account
MFA: When two authentication methods or more than 2 are being used to provision the account
2 or 3 credentials, but the only criteria to qualify as MFA is that there is more than one credential
required to confirm a person’s identity.
During PSM installation, the PSMConnect and PSMAdminConnect users are created on the PSM server
machine:
PSMConnect: An account through PSM using a connection method defined in the PVWA. PSMConnect
user is used to start PSM sessions on a PSM Machine.
There are cases where managing the local administrator passwords is not possible at the initial stage of
deployment.
Just in Time access can be used as an intermediate step towards full implementation of Vaulting the
local administrators. End user requests access to a designated ad-hoc target machine and is
subsequently added to the local admin groups.
Just in Time (JIT) access is available only to users authenticating to the PVWA using LDAP.
Note: You can grant Windows admins on-demand, ad-hoc privileged access to Windows targets for a
limited period (the default is for 4 hours).
A Client Access License (CAL) Suite is a license provided by Microsoft to RDP to target servers.
CyberArk Privileged Session Manager (PSM) uses these CAL licenses to establish the connections to
target servers.
After installing the PSMs, you can ask the respective team to configure the CAL license on PSM servers
so that connections can be established to target servers via PSMs. It totally depends upon the
company’s policy to have the license per server based or per user based.
CyberArk PSM records privileged sessions and stores them in the Vault where they can be viewed at any
time by authorized users.
When you hit the connect button and establish a connection to the target server then the recordings are
stored on a PSM’s recording folder on temp basis and when you disconnect the session. Session
recordings are stored by PSMApp user to respective recording safe in CyberArk vault.
Logon Account: A logon account can be used where direct login of an account is not permitted.
When a logon account is mapped with an account, it will be used to log onto the target server and then
elevate itself to the role of the privileged user.
Reconcile Account: Reconcile account can be used to reset the password of an account when the
password of an account is not known or lost, using an associated reconcile account you can reset the
password.
Logon account is generally used for Unix accounts where the root account is not allowed to login directly
on the server so, logon account is used which may give switch permissions so that after logging to server
using logon account you can switch to root user.
To reset the account’s password, reconcile account must be given necessary permission to reset the
password of any account.
Q.26. What are process and prompt files and used for?
Terminal Plugin Controller (TPC) platform helps you create new CPM plugins using terminal and scripting
languages for terminal-based devices.
TPC plugins are made up of two files that the platform uses to authenticate to target machines:
Prompts: The Prompts file includes a list of conditions. When the plugin runs, TPC matches the
conditions defined in this file to the output (prompts) it received from the target machine.
Process: The Process file includes all the states and transitions that are relevant to the flow.
CyberArk TPC supports plugins that are based on SSH, Telnet, Python, PowerShell, cScript.
When you install CyberArk HA vault Quorum disk is one of the main requirements.
Quorum: It tells the cluster which physical server(s) should be active at any given time. A small disk that
is used to identify the connectivity and availability of the active node.
The Quorum mechanism is used to prevent communication errors from causing split brain scenarios.
Q.28. If you want to apply a new license in your CyberArk Vault – How to do it?
First take a backup of existing license and then just replace it with the new and restart the PrivateArk
Server service.
Note: New license can be procured from CyberArk professional services based on your requirements
and if new license is not working after successfully replacing with the old, you must reach out to
CyberArk Professional services only.
When vault to be integrated with SIEM solutions like Splunk, Sentinel, QradaR etc.
After you make changes in dbparm.ini then some changes need to be configured at SIEM server end too
like whitelisting the Prod Vault IP address.
Q.30. If you find there’re more than 5000+ accounts non-compliant then what will be your action?
You can pull out the compliance report and can find out how many accounts are compliant and non-
compliant:
First you can segregate the errors, it might be chance that few accounts might be having same errors, so
segregate the errors.
Make a list of an errors and it might be related to Port not open, firewall blocking the connection, bad
user or password, policy blocking etc.
When you find out the errors then accordingly work on it to open the ports contact the respective team
like for windows, we need 135, 139, 445 and for Unix its 22.
If it’s the bad user or password then check the password complexity and forbidden chars, it should be
same as the server. You can refer the CPM logs and third-party logs to find out the root cause and
accordingly work on the issues and can fix it by using the PUU. When you download the compliance
report you might see some discrepancy in the report like few accounts will be compliant when you
search in CyberArk PVWA, but it is showing non-compliant in report.
Note: Why it’s so? Because when you change the password of an account manually then it might not
show compliant in compliance report. When an account’s password is changed automatically by CPM
then it will show compliant in report.